Author of the publication

Generating Dynamic Box by Using an Input String.

, , , , and . MobiSec, volume 971 of Communications in Computer and Information Science, page 17-29. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core., , , , and . BWCCA, page 360-365. IEEE, (2013)The simulation of an emotional robot implemented with fuzzy logic., , , and . Soft Comput., 18 (9): 1729-1743 (2014)A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks., , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 255-270. Springer, (2011)AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments., , , , , and . IEEE Access, (2018)Designing A Healthcare Authorization Model Based On Cloud Authentication., , , and . Intell. Autom. Soft Comput., 20 (3): 365-379 (2014)High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication., , , , and . IMIS, page 487-492. IEEE Computer Society, (2014)A Multiple-Key Management Scheme in Wireless Sensor Networks., , , , , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 337-344. Springer, (2013)A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation., , and . CD-ARES, volume 7465 of Lecture Notes in Computer Science, page 578-592. Springer, (2012)Random Cladding with Feedback Mechanism for encrypting mobile messages., , , , , and . INFOCOM Workshops, page 970-975. IEEE, (2016)Building a block cipher mode of operation with feedback keys., , , , , , and . ISIE, page 1-4. IEEE, (2013)